Sciweavers

3145 search results - page 68 / 629
» Key Improvements to XTR
Sort
View
ICSOC
2010
Springer
14 years 11 months ago
Carbon-Aware Business Process Design in Abnoba
A key element of any approach to meeting the climate change challenge is the ability to improve operational efficiency in a pervasive fashion. The notion of a business process is a...
Konstantin Hoesch-Klohe, Aditya K. Ghose
125
Voted
ISAMI
2010
14 years 7 months ago
What Context Matters? Towards Multidimensional Context Awareness
Context management has been a key technique in Ambient Intelligence applications development, although its use has not attain such success in other environments, such as those evol...
Víctor Penela, Carlos Ruiz Moreno, Jose Man...
139
Voted
ECIR
2011
Springer
14 years 4 months ago
SkipBlock: Self-indexing for Block-Based Inverted List
In large web search engines the performance of Information Retrieval systems is a key issue. Block-based compression methods are often used to improve the search performance, but c...
Stéphane Campinas, Renaud Delbru, Giovanni ...
ASIACRYPT
2009
Springer
15 years 7 months ago
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
We present a new construction of non-committing encryption schemes. Unlike the previous constructions of Canetti et al. (STOC ’96) and of Damg˚ard and Nielsen (Crypto ’00), ou...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan